Sciweavers

8177 search results - page 288 / 1636
» Detecting System Emulators
Sort
View
140
Voted
TSP
2008
147views more  TSP 2008»
15 years 3 months ago
Low-Complexity MIMO Multiuser Receiver: A Joint Antenna Detection Scheme for Time-Varying Channels
Abstract--This paper deals with the uplink of a wireless multiple-input multiple-output (MIMO) communication system based on multicarrier (MC) code division multiple access (CDMA)....
Charlotte Dumard, Thomas Zemen
SECURWARE
2008
IEEE
15 years 9 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
ACSAC
2001
IEEE
15 years 7 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 3 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 3 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz